Module 16 - Hacking Wireless Networks ( EC Mode ) Flashcards
Which of the following technologies serves as an air interface for 4G and 5G broadband wireless communications?
A. OFDM
B. DSSS
C. FHSS
D. MIMO-OFDM
Answer: D. MIMO-OFDM
Which of the following is a communication standard that is also known as WiMAX and is designed to provide multiple physical layer (PHY) and MAC options?
A. 802.11n
B. 802.16
C. 802.11g
D. 802.15.1
Answer:
B. 802.16
Which of the following wireless standards uses modulation schemes such as GFSK, π/4-DPSK, and 8DPSK and a frequency of 2.4 GHz with data transfer rates in the range of 25–50 Mbps?
A. 802.16 (WiMAX)
B. 802.11a
C. 802.11g
D. 802.15.1 (Bluetooth)
Answer:
D. 802.15.1 (Bluetooth)
Which type of antenna is commonly used in wireless communication?
A. Parabolic
B. Omnidirectional
C. Bidirectional
D. Unidirectional
Answer:
B. Omnidirectional
What technology is used to connect wireless devices to a wireless/wired network?
A. Hotspot
B. Bandwidth
C. Access point (AP)
D. Association
Answer:
C. Access point (AP)
In which authentication process do the station and access point use the same WEP key to provide authentication, which means that this key should be enabled and configured manually on both the access point and the client?
A. Shared key authentication process
B. Open-system authentication process
C. WEP encryption
D. WPA encryption
Answer:
A. Shared key authentication process
Which of the following is considered a token used to identify a 802.11 (Wi-Fi) network, which is by default part of the frame header sent over a wireless local area network (WLAN)?
A. Association
B. SSID
C. Hotspot
D. Access point
Answer:
B. SSID
Which of the following is considered as the method of transmitting radio signals by rapidly switching a carrier among many frequency channels?
A. Multiple input, multiple output orthogonal frequency-division multiplexing (MIMO-OFDM)
B. Direct-sequence Spread Spectrum (DSSS)
C. Frequency-hopping Spread Spectrum (FHSS)
D. Orthogonal Frequency-division Multiplexing (OFDM)
Answer:
C. Frequency-hopping Spread Spectrum (FHSS)
Which of the following wireless technologies involves multiplying the original data signal with a pseudo-random noise spreading code?
A. Frequency-hopping Spread Spectrum (FHSS)
B. Direct-sequence Spread Spectrum (DSSS)
C. Multiple input, multiple output orthogonal frequency-division multiplexing (MIMO-OFDM)
D. Orthogonal Frequency-division Multiplexing (OFDM)
Answer:
B. Direct-sequence Spread Spectrum (DSSS)
Which of the following is a standard for Wireless Local Area Networks (WLANs) that provides improved encryption for networks that use 802.11a, 802.11b, and 802.11g standards?
A. 802.11n
B. 802.11i
C. 802.11e
D. 802.11d
Answer:
B. 802.11i
Which of the following terms describes the amount of information that may be broadcast over a connection?
A. Bandwidth
B. ISM band
C. BSSID
D. Hotspot
Answer:
A. Bandwidth
In LAN-to-LAN Wireless Network, do the APs provide wireless connectivity to local computers, and computers on different networks that can be interconnected?
A. True
B. False
Answer:
True
Which of the following Wi-Fi security protocols uses GCMP-256 for encryption and HMAC-SHA-384 for authentication?
A. CCMP
B. WPA3
C. PEAP
D. WEP
Answer:
B. WPA3
Which of the following encryption methods has KRACK vulnerabilities that make it susceptible to packet sniffing, connection hijacking, malware injection, and decryption attacks?
A. WPA2
B. EAP
C. WPA
D. WEP
Answer:
A. WPA2
Which of the following encryption methods does WPA2 use for wireless data encryption, and at which encryption level?
A. 128 bit and TKIP
B. 64 bit and CCMP
C. 128 bit and CCMP
D. 128 bit and CRC
Answer:
C. 128 bit and CCMP
Which of the following cryptographic algorithms is used by CCMP?
A. DES
B. RC4
C. TKIP
D. AES
Answer:
D. AES
Donald works as a network administrator with ABCSecurity, Inc., a small IT based firm in San Francisco. He was asked to set up a wireless network in the company premises which provides strong encryption to protect the wireless network against attacks. After doing some research, Donald decided to use a wireless security protocol which has the following features:
Provides stronger data protection and network access control
Uses AES encryption algorithm for strong wireless encryption
Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP)
Which of the following wireless security protocol did Donald decide to use?
A. WEP
B. TKIP
C. WPA
D. WPA2
Answer:
D. WPA2
Which of the following encryption techniques is used in WPA?
A. RSA
B. DES
C. TKIP
D. AES
Answer:
C. TKIP
Which of the following wireless security protocols does not provide cryptographic integrity protection?
A. WEP
B. WPA2
C. TKIP
D. WPA
Answer:
A. WEP
Which of the following protocols encapsulates the EAP within an encrypted and authenticated Transport Layer Security (TLS) tunnel?
A. PEAP
B. CCMP
C. RADIUS
D. LEAP
Answer:
A. PEAP
Which of the following wireless security protocols consists of 40/104 bit encryption key length?
A. WEP
B. RSA
C. WPA2
D. WPA
Answer:
A. WEP
Which of the following wireless security protocols includes mandatory support for Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)?
A. WEP
B. TKIP
C. WPA2
D. WPA
Answer:
C. WPA2
Which of the following attack techniques is used by an attacker to send forged control, management, or data frames over a wireless network to misdirect wireless devices and perform other types of attacks such as DoS?
A. Availability attack
B. Integrity attack
C. Confidentiality attack
D. Authentication attack
Answer:
B. Integrity attack
Which of the following is a type of access-control attack in which an attacker uses any USB adapter or wireless card and connects a host to an unsecured client to attack a specific client or to avoid AP security?
A. Ad hoc association
B. Promiscuous client
C. Unauthorized association
D. Client mis-association
Answer:
A. Ad hoc association
In which of the following types of attack does an attacker exploit the carrier-sense multiple access with collision avoidance (CSMA/CA) clear channel assessment (CCA) mechanism to make a channel appear busy?
A. Beacon flood
B. EAP failure
C. Access point theft
D. Denial of service
Answer:
D. Denial of service
In which of the following attacks does an attacker exploit dynamic routing protocols, such as DSR and AODV, and place themselves strategically in a target network to sniff and record ongoing wireless transmissions?
A. Wormhole attack
B. Honeypot AP attack
C. Sinkhole attack
D. RADIUS replay
Answer:
A. Wormhole attack